breach of Principle 1 - unlawful processing?
breach of Principle 3 - not adequate?
breach of Principle 4 - not accurate?
breach of Principle 6 - not in accordance with subjects' rights?
breach of Principle 7 - inadequate security against unlawful processing?
breach of Principle 8 - sending the data outside the EEA and into the ether
?
Alasdair Warwood
----- Original Message -----
From: Ian Welton <[log in to unmask]>
To: <[log in to unmask]>
Sent: Wednesday, February 07, 2001 7:40 PM
Subject: Re: Subject access - email
> On Tuesday, February 06, 2001 at 2:11 PM
> [log in to unmask]
>
> Stated
>
> > And if you were to find the email WHAT IF (I am learning with these
> > hypothetical cases) you accidentaly ;-) pressed the delete button?
> > Problem over, loveley jobley :-)
> >
> > (Equivalent to the guard dog chewed the backup tape syndrome ...
> > and I hope noone from the Office ;-) is snooping in. Only MI5,6,CIA and
> FBI
> > are snooping in this list).
> >
> > Charles :-)
>
>
> Joking apart - Have been looking at Section 8(6) of the DPA 1998,
> which covers routine deletions which may be made following the receipt of
a
> subject access request. Inherent in that section is that data must not be
> deleted
> merely because of the receipt of a subject access request.
>
> Clearly there would be a breach for deleting a document deliberately
> following receipt of a subject access request; What would the offence be?
>
> Ian W.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|